You are on page 1of 22

CRYPTOGRAPHY

CRYPTOGRAPHY

Presented By : Shibani

Guided By : Asst.
Presented By : Sidharth
Sarangi Prof. Smita
Mahapatra
IT Branch,
Regd
no.
ECE Branch, Regd
no.
Mohanty
Guided
By : Prof. X
0901298191
1001289324
1

OVERVIEW

Cryptography
Vocabulary
Encryption &
Decryption
Transmission
Technique
Symmetric
Cryptography
Asymmetric
Cryptography

WHAT IS CRYPTOGRAPHY ?

Cryptography is the science of using


mathematics to encrypt and decrypt
data.
Cryptography enables you to store
sensitive information or transmit it
across insecure networks so that it
cannot be read by anyone except the
intended recipient.
3

VOCABULARY

Plaintext: Data that can be read and


understood
without
any
special
measures.
Encryption:
The
method
of
disguising plaintext in such a way as
to hide its substance is called
encryption.
Cipher text: Encrypting plaintext
results in unreadable gibberish called
cipher text.
Decryption: The process of reverting

VOCABULARY

Cryptanalysis: The art of breaking


ciphers, i.e. retrieving the plaintext
without knowing the proper key.
Cryptographers: People who do
cryptography
Cryptanalysts: Practitioners of
cryptanalysis.
Cryptology:
The
branch
of
mathematics
that
studies
the
mathematical
foundations
of

ENCRYPTION & DECRYPTION

WHY USE CRYPTOGRAPHY ?

For secret writing


To establish a shared secret when
other people (eavesdroppers) are
listening.
TYPES
Mainly classified into two types :
1. Symmetric key cryptography
2. Asymmetric key cryptography
7

bla-bla

TRANSMISSION TECHNIQUE
Cipher
ciphertext
msg

msg

decoder

encoder

Cipher text in
(ciphertext
Plain text in
- out

- plaintext out)

Plain
text in
in(plaintext
Cipher text ciphertext
out out)

cmb-cmb

bla-bla

eavesdropper
unde
rstand
Should (should
understand
NOTHING
about
the messagethemsg)
nothingabout
nothing
8

CLASSIFICATION
Cryptography
Symmetric key
cryptography

ryptography)

Classical
cryptography

Transposition
cipher

Asymmetric key
cryptography
(Public key

Modern
cryptography

Substitution
Stream
cipher
cipher

Block
cipher

SYMMETRIC KEY CRYPTOGRAPHY

BOTH SHOULD
KNOW THE KEY
10

TRANSPOSITION CIPHER

In
classical
cryptography,
a
transposition cipher changes one
character from the plaintext to
another i.e. the order of the characters
is changed.

11

SUBSTITUTION CIPHER

Substitution cipher is a method of


encryption by which units of plaintext
are
substituted
with
ciphertext
according to a regular system.

12

STREAM CIPHER

A Stream Cipher is a symmetric or


secret-key encryption algorithm that
encrypts a single bit at a time. With a
Stream Cipher, the same plaintext bit or
byte will encrypt to a different bit or
byte every time it is encrypted.
e.g. :
Plain text: Pay 100
Binary of plain text:
010111101
(hypothetical)
Key:
100101011 ----Perform XOR
____________________

13

BLOCK CIPHER

Block cipher technique involves


encryption of one block of text at a time
.Decryption also takes one block of
encrypted text at a time. Length of the
block is usually 64 or 128 bits.
e.g. :
Plain text: four and five
Four
and
five
Key
Key
Key
14

ASYMMETRIC KEY CRYPTOGRAPHY

Public key cryptography is an


asymmetric scheme that uses a Pair of
keys for encryption: a Public key, which
encrypts data, and a corresponding
Private key (secret key) for decryption.

15

CRYPTANALYSIS

Cryptanalysis refers to the study of


ciphers,cipher text, or cryptosystems
(that is, to secret code systems) with
a view to finding weaknesses in them
that will permit retrieval of the plain
textfrom the cipher text, without
necessarily
knowing
thekeyor
thealgorithm.
This
is
known
asbreakingthe cipher, cipher text, or
cryptosystem.

16

CRYPTANALYSIS TECHNIQUES

Known - plain text analysis


Chosen plain text analysis
(Differential cryptanalysis)
Cipher text - only analysis
Man in the - middle attack
17

ACOUSTIC CRYPTANALYSIS

It is a side channel attack which exploits


sounds emitted by computers or machines.
Modern acoustic cryptanalysis mostly
focuses on sounds emitted by computer
keyboards
and
internal
computer
components
Historically it has also been applied to
impact printers and electromechanical
cipher machines.
18

COUNTER MEASURES

Use rubber keyboard or virtual


keyboards to prevent keystroke
sounds.
Use acoustic printers.
Use Acoustic case for CPU.

19

CONCLUSION

Cryptography, being an art of


encrypting and decrypting confidential
information and private messages,
should be implemented in the network
security to prevent any leakage and
threat.
It can be done by using any of these
techniques
discussed
above
for
fortifying
the
personal
data
transmission as well as for secure

20

REFERENCE

Yang,
Sarah
(14
September
2005),"Researchers recover typed text
using
audio
recording
of
keystrokes",UC Berkeley News.
Adi Shamir & Eran Tromer."Acoustic
cryptanalysis". Blavatnik School of
Computer Science, Tel Aviv University.
Retrieved 1 November 2011.
21

Thank
you.
22

You might also like